LocalSettings.php 911:Secret services - Wiki

911:Secret services

From Wiki

(Difference between revisions)
Jump to: navigation, search
Walden (Talk)
(Personal records)
Newer edit →

Revision as of 04:20, 1 November 2009

Site menu:





  • Todo: secret/military network infrastructures, financial payment infrastructures, encrypted lines.

Personal records

  • State number ("social 'security' number")
  • Social profile
    • Address
    • Family composition (present and past genealogy)
    • Health record
    • Occupational record
    • Educational record
    • Legal record (police/court/fines/crime/jail)
    • Financal record
      • Bank accounts
      • Income
      • Taxation (private and corporate)
      • Spending record (house loan, debt, consumer spending, investments, ...)
      • Pension funds
      • Social welfare record
    • Travel record (visa's / state-entry, boarding logs: bus/metro/train/ferry/airline)
    • Internet tracks (email, web sites, ...)
    • Personal character record (emotional/intellectual classification, pastime passions, luxury goods / entertainment spending, sexuality, etc.)
  • Biometrics:
    • Facial scans
    • Fingerprints
    • Eye scan
    • Voice signature
    • DNA signature

Special networks



Phone tracing

  • Todo:
    • Mobile phone tracing/triangulation/wiretapping (passive/activated-by-defined-signatures and active/on-demand), identification.
    • Mobile phone infrastructure (connection logs, voice/web data)
    • VOIP provider data hooks/requests for secret services (Skype, Google Voice, etc.)


  • Todo:
    • ISP data-retention/IP-request laws and its enforcement
    • Secret services and ISP collaborations
    • Credit card purchasing information (privacy, fraud, etc.)
    • Web browser cookie issues
    • Email taffic espionage (gmail, hotmail)
    • Search engine espionage (google)
    • Software install espionage (anti-virus software, ...)
    • Hardware/appliance espionage (ISP modems, consumer routers/switches, google appliance, ...)
  • Social networking
    • video: Does what happens in the Facebook stay in the Facebook?
    • Social Networking Sites and the Surveillance Society
    • Identity 'at risk' on Facebook
    • Pentagon sets its sights on social networking websites
    • Profiling/Searching populations through Facebook, MySpace (owned by Rupert Murdoch)
    • Security/privacies issues
      • Information gleaned from social networks has cost people jobs, led to suspensions and expulsions, damaged prospects for employment and university admission, helped crooks defraud victims and generated criminal charges. Universities scour social networking sites for evidence of residence keg parties, in violation of campus policies. Admissions officers use them to evaluate university-bound students. Police tap into them to investigate underage drinking and sexual activity. Companies check out Facebook to help with direct marketing campaigns. And increasingly, employers are using them to screen prospective employees....“Anything on the site, Facebook can see and data mine,”
      • For companies that engage in Datamining “Not only is it a wide range of personal information that’s cross-referenced and verified by the individuals themselves, but people themselves are volunteering this information.”
      • Risks associated with the use of social networks
        • Data, once published, may remain there forever;
        • Traffic data may be shared with third parties, including advertisers and law enforcement agencies;
        • Third parties may misuse the data they obtain;
        • Photos posted to social networking sites may be connected to facial recognition software and become universal biometric identifiers
        • The availability of personal data in user profiles could lead to increased identity theft.

Video cameras

RFID systems


Entertainment devices

  • Digital TV's
  • Online game consoles
  • Phone-home set-top boxes







European Union

    • "UE FP7 INDECT Project: "Intelligent information system supporting observation, searching and detection for security of citizens in urban environment. Project Description: Intelligent information system supporting observation, searching and detection for security of citizens in urban environment.
    • The main objectives of the INDECT project are:
      • to develop a platform for: the registration and exchange of operational data, acquisition of multimedia content, intelligent processing of all information and automatic detection of threats and recognition of abnormal behaviour or violence,
      • to develop the prototype of an integrated, network-centric system supporting the operational activities of police officers, providing techniques and tools for observation of various mobile objects,
      • to develop a new type of search engine combining direct search of images and video based on watermarked contents, and the storage of metadata in the form of digital watermarks,[2].
    • The main expected results of the INDECT project are:
      • to realise a trial installation of the monitoring and surveillance system in various points of city agglomeration and demonstration of the prototype of the system with 15 node stations,
      • implementation of a distributed computer system that is capable of acquisition, storage and effective sharing on demand of the data as well as intelligent processing,
      • construction of a family of prototypes of devices used for mobile object tracking,
      • construction of a search engine for fast detection of persons and documents based on watermarking technology and utilising comprehensive research on watermarking technology used for semantic search,
      • construction of agents assigned to continuous and automatic monitoring of public resources such as: web sites, discussion forums, UseNet groups, file servers, p2p networks as well as individual computer systems,
      • elaboration of Internet based intelligence gathering system, both active and passive, and demonstrating its efficiency in a measurable way.[3]

United Kingdom

  • British Council
    • "Private sector language schools with whom the British Council compete complain about the state subsidized competition. While the language teaching makes a profit, the accounting is not transparent and if it were privatized, it is doubtful the it could be promoted in the way it is at present." (wikipedia)
  • MI5
    • "MI5, which has a target of increasing its current 3,000 staff to 4,000 by 2011, also insisted that it wanted to improve relations with Muslim communities." [1]
    • MOSSAD (Israel)



  • DIS ("Dipartimento delle Informazioni per la Sicurezza" - secret service)
    • AISI ("Agenzia Informazioni e Sicurezza Interna" - national)
    • AISE ("Agenzia Informazioni e Sicurezza Esterna" - international)


  • AIVD


  • French intelligence constitutes of two major units: the DGSE("In 2009, the DGSE had an estimated staff of approximately 5,000 employees." [2]) the external agency and the DCRI the domestic agency. The latter being part of the police while the former is associated to the army. The DGSE is notorious for the Sinking of the Rainbow Warrior, but it is also known for revealing the most extensive technological spy network uncovered in Europe and the United States to date through the mole Vladimir Vetrov.


  • CNSAS ("National Council for the Study of Securitate Archives") (Romania)

North America

United States

  • See also:
    • US secret service IP's: "Now, if you scan these IP addresses, you will find that they all match up...the list is somewhat outdated I suspect, but since they all match up (...) If you trace these IPs most will lead back to "The Internet Access Company" [??], and they also go through Cogent Communications, a Washington DC based tech company that has been doing quite well for being a very young business."


  • “The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. (...) The capacity to assert social and political control over the individual will vastly increase. It will soon be possible to assert almost continuous surveillance over every citizen and to maintain up-to-date, complete files, containing even most personal information about the health or personal behavior of the citizen in addition to more customary data. These files will be subject to instantaneous retrieval by the authorities.”-Zbigniew Brzezinski, protegé of David Rockefeller, cofounder of the Trilateral Commission, and NSA to Jimmy Carter, from his 1971 book Between Two Ages[3]


  • FBI
  • DEA
  • tolink: ODNI, NIC, NNSA, DOJ, ATF, FINCEN, PFIAB, IOSS, NICX, the U.S. Marshals, Customs, the USPS Postal Inspectors, the Secret Service, Treasury, SBU (Ukraine), ASIS, NZSIS, BND, CSIC, CNI, NBH, ABW, SEID, SISD, the FSB, PRC Intelligence, ROC MJIB, the Japanese Naicho, and all of the U.S., SEATO and ASEAN Defense Departments.



  • GRU (1918, created by Jesuit coadjutor Lenin)
  • Foreign Intelligence Service (Russia)
    • "KGB's archives affords me a glimpse at Vatican's Intelligence Service":
      • "Stanislav Lekarev, a well-placed investigative reporter and a former Soviet official, reveals the results of his heart-to-heart with a friend that still has access to the documents from KGB's 5th Chief Directorate that was also responsible for dealing with religious dissent. Despite the Holy See's curt, Jesuit-like denial of having any involvement in intelligence activities, the archives shed rare light on the Vatican's well-though-thinly-cloaked clandestine activities in USSR. Vatican's Secret Service is a well-compartmentalized into its many cover organizations conveniently subdivided by their religious activities that afford the Holy See the advantages over any other intelligence service. The strategically important service is the responsibility of the Jesuits. The order is under the direct command of the pontiff. The Jesuits manage information-gathering functions for the Vatican. Thus the Russian department is conveniently set up under the cover of the Congregation of the Eastern Churches, Actione Catolica, Russia Christiana, and has its operations center at the St. Georgio Institute in Medona, and at the Modesto Monastery in Seriate, a picturesque suburb of Milan. The department that runs its agents in Russia is the mysterious Russicum [4], which has a legitimate appearance of any other Catholic outreach facility, recruiting into its ranks residents of Eastern Europe. Information gathering takes place under the guise of very conventional missionary activity, a non-governmental charity work, seemingly innocent purchase of a government's archives. The Russian desk is still run by its Vatican's former USSR directorate which bears the name of the St. Teresa Russian Catholic College. The external and hands-on operations are also performed by the Dominican Order. The order uses its international resources to exfiltrate its agents, to discredit undesirable officials, and other cloak and dagger operations. Its low-profile department of Sodalicium Pianium is responsible for internal security, taking care of the Vatican's own heretics, and vetting out Vatican's security apparatus. Thus Vatican has plenty of organizations to also collaborate with other intelligence agencies. Joint projects with CIA, MI6, SDECE and Mossad has been through The Sovereign Military and Hospitaller Order of St. John of Jerusalem of Rhodes and of Malta. Pinochet and the Polish Solidarnosc (Solidarity) are good examples of Vatican's intelligence networking par excellence."
      • "Vatican intelligence has spied on Russia for many years"



  • ...





  • "Current US intelligence classifications"
  • "The U.S. Domestic Intelligence Enterprise"
  • Intellipedia
    • "Google has lots to do with intelligence" (March 30, 2008):
      • "The system is modeled after Wikipedia, the public online, group-edited encyclopedia. However, the cloak-and-dagger version is maintained by the director of national intelligence and is accessible only to the CIA, FBI, National Security Agency and an alphabet soup of other intelligence agencies and offices. Agents can log in, depending on their clearance, to Intellipedia's three tiers of service: top secret, secret and sensitive but unclassified. So far, 37,000 users have established accounts on the network, which contain 35,000 articles encompassing 200,000 pages, according to Dennehy. Google supplies the computer servers that support the network, as well as the search software that allows users to sift through messages and data."
  • AxisGlobe eastern secret service news.
  • CACI:
    • "A publicly held Information Technology (IT) company, headquartered in Arlington, Virginia and London, England. CACI provides national security, defense, and intelligence-related solutions in the national interest of the United States to counter the threat of global terrorism, assure homeland security, and strengthen the company’s role as a national asset for national missions. CACI has approximately 11,800 employees in 120 offices in the US and Europe; 69% of CACI employees hold security clearances."
    • Richard Armitage was a former Deputy Secretary of State and former board member of CACI, the private military contractor whose employees were responsible for torturing prisoners at Abu Ghraib prison.
Personal tools